ansible-error-handling

Pass

Audited by Gen Agent Trust Hub on Feb 25, 2026

Risk Level: SAFE
Full Analysis
  • [SAFE]: The skill is entirely instructional, providing patterns for Ansible playbook development without including malicious scripts or obfuscated code.
  • [COMMAND_EXECUTION]: The skill demonstrates the use of Ansible's command and shell modules for system management. It promotes security and reliability by showing how to use changed_when and failed_when to ensure tasks are idempotent and handle expected errors correctly.
  • [EXTERNAL_DOWNLOADS]: Examples include the use of ansible.builtin.get_url to download software packages. The provided URLs use the example.com domain for illustrative purposes and do not point to untrusted or malicious remote code.
  • [CREDENTIALS_UNSAFE]: The skill advocates for the use of no_log: true when tasks interact with sensitive data, such as API tokens, which prevents credentials from being exposed in Ansible's execution logs.
  • [SAFE]: Input validation is emphasized through the use of ansible.builtin.assert with regular expression matching, which helps mitigate risks associated with untrusted variable injection in automation scripts.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 25, 2026, 06:12 PM